The basic fundamental of cybersecurity and how can it be used for unethical purposes.
For this type of presentations (customised), you can contact me here : rishav.sadhu11@gmail.com
What is Cyber Security ?
Cyber security is the practice of protecting systems, networks, and programs from digital
attacks. These cyber attacks are usually aimed at accessing, changing, or destroying sensitive
information; extorting money from users; or interrupting normal business processes. A
successful cybersecurity approach has multiple layers of protection spread across the
computers, networks, programs, or data that one intends to keep safe. In an organization, the
people, processes, and technology must all complement one another to create an effective
defense from cyber attacks.
“ Don’t let your trash become someone else’s
treasure. Feed your shredder often. ”
Let’s Talk
About It
Cyber security standards are security
standards which enable
organisations to practice safe
security techniques to minimize the
number of successful cyber security
attacks.
Cyber-security is both about the
insecurity created through
cyberspace and about the technical
and non-technical practices of
making it more secure.
Cyber security refers to the
technologies and processes
designed to protect computers,
networks and data from unauthorized
access, vulnerabilities and attacks
delivered via the Internet by cyber
criminals.
What is Cyber Crime
Cyber Crime can be defined as offences
that are committed against individuals or
groups of individuals with a criminal motive
to intentionally harm the reputation of the
victim or cause physical or mental harm, or
loss, to the victim directly or indirectly,
using modern telecommunication networks
such as Internet (networks including chat
rooms, emails, notice boards and groups)
and mobile phones (Bluetooth /SMS/MMS)
Cybercrime may threaten a
person or a nation’s
security and financial
health.
Issues surrounding these types
of crimes have become high-
profile, particularly those
surrounding hacking, copyright
infringement, unwarranted
mass-
surveillance, sextortion, child
pornography and child
grooming
There are also problems
of privacy when confidential information is
intercepted or disclosed,
lawfully or otherwise.
Common Cyber Threats
You can simply impress your audience and add a unique zing and
appeal to your Presentations.
Email Account Takeover
You can simply impress your audience and add a unique zing and
appeal to your Presentations.
Phishing
You can simply impress your audience and add a unique zing and
appeal to your Presentations.
Call Forwarding & Credential Replay
You can simply impress your audience and add a unique zing and
appeal to your Presentations.
Malware
You can simply impress your audience and add a unique zing and
appeal to your Presentations.
Spoofing
How to create a shield ?
Schwab’s internal Information Security Program :
Internal controls and training
Advanced Technology :
Advanced encryption technology
Scans for suspicious behaviour
Schwab Mobile App
`
Internal Security
Advance
Technology Information
Security
Information Security Controls :
Passwords
Schwab Security Tokens
Biometric identity verification through Voice ID
Alert
Safety Security
Using stolen Social Security numbers
for employment or other gain
– filing a false tax return
– impersonating another person
Identity Theft
Social Security numbers
Usernames
Date of birth
Passwords
Credit card numbers
Account numbers
Employment information
Checks
Personal Data Stolen
Fraudulent Transactions
– trading
– electronic funds or wire transfers
– account opening
Resulting Crimes
How Cyber Criminals
use stolen data
Identity theft is currently a gold mine for
cybercriminals—one that reached an all-
time high in 2016, with up to $16 billion
worth of losses caused by fraud and
identity theft. Most people are already
aware that theft can happen due to high
visibility cases that occurred during the
past couple of years, like the attack on
Yahoo during latter half of 2016. While
identity theft should be concerning in
itself, the real, tangible damage usually
comes after, when an attacker uses the
stolen information for malicious purposes.
Security is everyone’s
responsibility
Add Text
Easy to change colors,
photos and Text.
Add Text
Easy to change colors,
photos and Text.
Add Text
Easy to change colors,
photos and Text.
Add Text
Easy to change colors,
photos and Text.
A successful cyber security approach has multiple layers of protection
spread across the computers, networks, programs, or data that one
intends to keep safe. In an organization, the people, processes, and
technology must all complement one another to create an effective
defence from cyber attacks
Additional security practices
and behaviours
You can simply impress your audience and add a unique zing and appeal to your Presentations. Get a modern
PowerPoint Presentation that is beautifully designed. I hope and I believe that this Template will your Time, Money
and Reputation. Get a modern PowerPoint Presentation that is beautifully designed. I hope and I believe that this
Template will your Time, Money and Reputation.
Let’s Talk About It…
Architechtu-
re
Here the firewall is inspecting all traffics coming in and out
from the internet via various servers connected to it. We’ll
provide a highlight on these three major medias.
Delivery
Channel
Connectio-
ns
Legacy Gateway
Security Implementation
“SEC_RITY is not complete without U!”
A tremendous amount of security knowledge is
unstructured -- created by humans, for humans --
making it inaccessible to traditional systems. ... In this
short demo, Watson for Cyber Security helps
a security analyst investigate a particular incident to
uncover new patterns and security context never
before seen.
As cyberattacks grow in volume and complexity,
artificial intelligence (AI) is helping under-resourced
security operations analysts stay ahead of threats.
Curating threat intelligence from millions of research
papers, blogs and news stories, AI provides instant
insights to help you fight through the noise of
thousands of daily alerts, drastically reducing
response times.
AI technologies like machine learning and natural
language processing enable analysts to respond to
threats with greater confidence and speed.
Watson for Cyber SecurityAI for Cyber
Security
“ Protect personal information. The identity saved could be your own ”
Who Could Be
An
ATTACKER ?
Governments attempting to
use AI to establish
hegemony, control people,
or take down other
governments.
Corporations trying to
achieve monopoly,
destroying the competition
through illegal means.
Militaries developing cyber-
weapons and robot soldiers
to achieve dominance.
01
03
05
Doomsday cults attempting
to bring the end of the world
by any means.
Criminals attempting to
develop proxy systems
to avoid risk and
responsibility.
Hackers attempting to steal
information, resources or
destroy cyberinfrastructure
targets.
02
04
06
of Cyber Security
Advantages
Block Unwanted Traffic :
Help free up bandwidth for
legitimate business traffic
Reduce cost :
Eliminate the need to buy and
manage premises-based
security devices and
appliances.
Buy What You Need :
Pay-as-You_ Go service let you
scale the solution easily as your
organization grows.
Always On :
Proactive security keeps you
ahead of threats and changing
conditions to stay in control.
Benefits :
IT security solutions are essential for all kinds
of businesses, particularly when you think
about how important the internet and your
digital systems are for your day-to-day
operations.
In 2017, more than 46% of UK businesses
suffered a cyber-attack (Cyber security
breaches survey 2017) of some sort, and
without the very best in cyber security
solutions, many of these businesses
have suffered as a result, with decreased
customer trust and even the actual theft of
personal information.
Reporting Cyber
Crime
Victim
Support
NFIB Alerts
What to do?
If you or someone else is in immediate danger or risk of harm dial 999 now.
If you are suffering a live cyber attack that is in progress, call now on 0300
123 2040 to report, do not report using the online tool. This service is
available 24 hours a day, 7 days a week for businesses, charities and
organisations. Our advisors are also available 24/7 on web chat if you
have any questions - http://www.actionfraud.police.uk/report-a-fraud-
including-online-crime
Victim Support
Get a modern PowerPoint
Presentation that is beautifully
designed. Easy to change colors,
photos and Text.
National Fraud Intelligence Bureau
Get a modern PowerPoint
Presentation that is beautifully
designed. Easy to change colors,
photos and Text.
Alerts
Get a modern PowerPoint
Presentation that is beautifully
designed. Easy to change colors,
photos and Text.
Law Enforcement
Get a modern PowerPoint
Presentation that is beautifully
designed. Easy to change colors,
photos and Text.
Law
Enforcement